"A malicious server could potentially overwrite key files to cause a
denial of service or, in some cases, gain privileges by modifying
executable files. The risk is mitigated because non-default
configurations are primarily affected, and the user must be convinced
to access the malicious server. However, web-based clients may be
more easily exploited."